319,572 results on '"Pandu Rangan, C."'
Search Results
2. A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme
3. An Efficient Non-transferable Proxy Re-encryption Scheme
4. Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting
5. Certificateless and Identity based Authenticated Key Exchange Protocols
6. Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model
7. Efficient single round attribute-based authenticated key exchange protocol
8. A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme
9. Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round
10. Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting
11. A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions
12. An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model
13. Cache Me If You Can: Capacitated Selfish Replication Games
14. Optimal Parameters for Efficient Two-Party Computation Protocols
15. Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures
16. Identity-Based Deterministic Signature Scheme without Forking-Lemma
17. Rational Secret Sharing with Honest Players over an Asynchronous Channel
18. A Polynomial Time Algorithm for Longest Paths in Biconvex Graphs
19. Conditional Proxy Re-Encryption - A More Efficient Construction
20. Identity Based Public Verifiable Signcryption Scheme
21. On the Security of Identity Based Ring Signcryption Schemes
22. Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security
23. Privacy Preserving BIRCH Algorithm for Clustering over Arbitrarily Partitioned Databases
24. Skew Heaps
25. Randomized Dictionary Structures
26. Trading Players for Efficiency in Unconditional Multiparty Computation
27. Efficient Asynchronous Secure Multiparty Distributed Computation
28. Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation
29. An Efficient Non-transferable Proxy Re-encryption Scheme
30. The Colored Sector Search Tree: A Dynamic Data Structure for Efficient High Dimensional Nearest-Foreign-Neighbor Queries
31. An Efficient Distributed Algorithm For st-numbering The Vertices Of A Biconnected Graph
32. Weighted irredundance of interval graphs
33. Edge-disjoint paths in permutation graphs
34. Weighted independent perfect domination on cocomparability graphs
35. Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model
36. Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round
37. Certificateless and Identity based Authenticated Key Exchange Protocols
38. Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures
39. An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model
40. Optimal Parameters for Efficient Two-Party Computation Protocols
41. Cache Me If You Can: Capacitated Selfish Replication Games
42. A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions
43. Identity-Based Deterministic Signature Scheme without Forking-Lemma
44. A Polynomial Time Algorithm for Longest Paths in Biconvex Graphs
45. Identity Based Public Verifiable Signcryption Scheme
46. Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security
47. Privacy Preserving BIRCH Algorithm for Clustering over Arbitrarily Partitioned Databases
48. Conditional Proxy Re-Encryption - A More Efficient Construction
49. Rational Secret Sharing with Honest Players over an Asynchronous Channel
50. Trading Players for Efficiency in Unconditional Multiparty Computation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.